These are the slides for a talk I gave to the Fredericksburg Linux User Group about Bitcoin and cryptocurrency in general on 2014-02-22. Audio is forthcoming from one of the attendees as a podcast.
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
A research-oriented introduction to the cryptographic currencies (starting wi...vpnmentor
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
VISUG - Approaches for application request throttlingMaarten Balliauw
Speaking from experience building a SaaS: users are insane. If you are lucky, they use your service, but in reality, they probably abuse. Crazy usage patterns resulting in more requests than expected, request bursts when users come back to the office after the weekend, and more! These all pose a potential threat to the health of our web application and may impact other users or the service as a whole. Ideally, we can apply some filtering at the front door: limit the number of requests over a given timespan, limiting bandwidth, ...
In this talk, we’ll explore the simple yet complex realm of rate limiting. We’ll go over how to decide on which resources to limit, what the limits should be and where to enforce these limits – in our app, on the server, using a reverse proxy like Nginx or even an external service like CloudFlare or Azure API management. The takeaway? Know when and where to enforce rate limits so you can have both a happy application as well as happy customers.
Speaking from experience building MyGet.org: users are insane. If you are lucky, they use your service, but in reality, they probably abuse. Crazy usage patterns resulting in more requests than expected, request bursts when users come back to the office after the weekend, and more! These all pose a potential threat to the health of our web application and may impact other users or the service as a whole. Ideally, we can apply some filtering at the front door: limit the number of requests over a given timespan, limiting bandwidth, ...
In this talk, we’ll explore the simple yet complex realm of rate limiting. We’ll go over how to decide on which resources to limit, what the limits should be and where to enforce these limits – in our app, on the server, using a reverse proxy like Nginx or even an external service like CloudFlare or Azure API management. The takeaway? Know when and where to enforce rate limits so you can have both a happy application as well as happy customers.
A Complete Beginners Guide to Blockchain Technology Part 4 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
A research-oriented introduction to the cryptographic currencies (starting wi...vpnmentor
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
VISUG - Approaches for application request throttlingMaarten Balliauw
Speaking from experience building a SaaS: users are insane. If you are lucky, they use your service, but in reality, they probably abuse. Crazy usage patterns resulting in more requests than expected, request bursts when users come back to the office after the weekend, and more! These all pose a potential threat to the health of our web application and may impact other users or the service as a whole. Ideally, we can apply some filtering at the front door: limit the number of requests over a given timespan, limiting bandwidth, ...
In this talk, we’ll explore the simple yet complex realm of rate limiting. We’ll go over how to decide on which resources to limit, what the limits should be and where to enforce these limits – in our app, on the server, using a reverse proxy like Nginx or even an external service like CloudFlare or Azure API management. The takeaway? Know when and where to enforce rate limits so you can have both a happy application as well as happy customers.
Speaking from experience building MyGet.org: users are insane. If you are lucky, they use your service, but in reality, they probably abuse. Crazy usage patterns resulting in more requests than expected, request bursts when users come back to the office after the weekend, and more! These all pose a potential threat to the health of our web application and may impact other users or the service as a whole. Ideally, we can apply some filtering at the front door: limit the number of requests over a given timespan, limiting bandwidth, ...
In this talk, we’ll explore the simple yet complex realm of rate limiting. We’ll go over how to decide on which resources to limit, what the limits should be and where to enforce these limits – in our app, on the server, using a reverse proxy like Nginx or even an external service like CloudFlare or Azure API management. The takeaway? Know when and where to enforce rate limits so you can have both a happy application as well as happy customers.
A Complete Beginners Guide to Blockchain Technology Part 4 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!RustyQRussell
linux.conf.au 2014 talk:
This talk presents a pre-alpha implementation of an adjunct network where gateways ferry between the
current bitcoin network and a new "pettycoin" network, which trades bitcoin's robustness for scalability. When complete, the result should be a network suitable for genuine microtransactions at the rate of thousands per second.
Introduction into blockchains and cryptocurrenciesSergey Ivliev
Slides from my intro course:
- mapping the digital asset ecosystem (as of August 2019)
- how bitcoin works - step-by-step primer?
- hashrate, dollar value transferred, transaction rate and other metrics (as of August 2019)
- hard money, uncorrelated asset and other use cases
- proof-of-stake and proof-of-identity
- horizontal and vertical scaling
- how ethereum smart contracts work?
- ERC20 token standard
- boom and bust of the ICO market (as of August 2019)
- intro into #DeFI (as of August 2019)
- stablecoins
- MarkerDAO, Compound, Uniswap and other cool decentralized finance protocols
- Cryptokitties, Storj, Peepeth and examples of non-financial dapps
A Complete Beginners Guide to Blockchain Technology Part 5 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...JAX London
2011-11-02 | 05:45 PM - 06:35 PM | Victoria
The Disruptor is new open-source concurrency framework, designed as a high performance mechanism for inter-thread messaging. It was developed at LMAX as part of our efforts to build the world's fastest financial exchange. Using the Disruptor as an example, this talk will explain of some of the more detailed and less understood areas of concurrency, such as memory barriers and cache coherency. These concepts are often regarded as scary complex magic only accessible by wizards like Doug Lea and Cliff Click. Our talk will try and demystify them and show that concurrency can be understood by us mere mortal programmers.
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
David Evans
DC Area Crypto Day
Johns Hopkins University
30 October 2015
This (non-research) talk will start with a tutorial introduction to cryptocurrencies and how bitcoin works (and doesn’t work) today. We’ll touch on some of the legal, policy, and business aspects of bitcoin and discuss some potential research opportunities in cryptocurrencies.
A New Age of JVM Garbage Collectors (Clojure Conj 2019)Alexander Yakushev
Some programmers might think that garbage collection is a solved problem. It runs with the VM and takes care of your unused objects – what else would you want? However, the recent spike of interest in new garbage collectors for JVM (Shenandoah, ZGC) and beyond (Go GC) shows that there are still possibilities for improvement. In this talk, we will briefly walk through the history of memory management and discover what the modern GCs can do for you.
This module explains several additional important concepts. These include properties of QObjects, data types, QString and various list types.
Special classes in Qt provide even more convenient APIs if you want to save settings in the right way for the target platform.
At the end, a guide walks you through what you need to know about embedding files and resources into your application.
Are you building high throughput, low latency application? Are you trying to figure out perfect JVM heap size? Are you struggling to choose right garbage collection algorithm and settings? Are you striving to achieve pause less GC? Do you know the right tools & best practices to tame the GC? Do you know to troubleshoot memory problems using GC logs? You will get complete answers to several such questions in this presentation.
Blockchain Satellites - The Future of Space CommerceHasshi Sudler
Presentation made on 10/26/2020 outlining the launch of the first private blockchain into space on the Firefly Aerospace rocket planned for late December, 2020. This presentation is delivered by Hasshi Sudler and Alejandro Gomez of Villanova University and Elizabeth Kennick and Joe Latrell of Teachers In Space.
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!RustyQRussell
linux.conf.au 2014 talk:
This talk presents a pre-alpha implementation of an adjunct network where gateways ferry between the
current bitcoin network and a new "pettycoin" network, which trades bitcoin's robustness for scalability. When complete, the result should be a network suitable for genuine microtransactions at the rate of thousands per second.
Introduction into blockchains and cryptocurrenciesSergey Ivliev
Slides from my intro course:
- mapping the digital asset ecosystem (as of August 2019)
- how bitcoin works - step-by-step primer?
- hashrate, dollar value transferred, transaction rate and other metrics (as of August 2019)
- hard money, uncorrelated asset and other use cases
- proof-of-stake and proof-of-identity
- horizontal and vertical scaling
- how ethereum smart contracts work?
- ERC20 token standard
- boom and bust of the ICO market (as of August 2019)
- intro into #DeFI (as of August 2019)
- stablecoins
- MarkerDAO, Compound, Uniswap and other cool decentralized finance protocols
- Cryptokitties, Storj, Peepeth and examples of non-financial dapps
A Complete Beginners Guide to Blockchain Technology Part 5 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...JAX London
2011-11-02 | 05:45 PM - 06:35 PM | Victoria
The Disruptor is new open-source concurrency framework, designed as a high performance mechanism for inter-thread messaging. It was developed at LMAX as part of our efforts to build the world's fastest financial exchange. Using the Disruptor as an example, this talk will explain of some of the more detailed and less understood areas of concurrency, such as memory barriers and cache coherency. These concepts are often regarded as scary complex magic only accessible by wizards like Doug Lea and Cliff Click. Our talk will try and demystify them and show that concurrency can be understood by us mere mortal programmers.
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
David Evans
DC Area Crypto Day
Johns Hopkins University
30 October 2015
This (non-research) talk will start with a tutorial introduction to cryptocurrencies and how bitcoin works (and doesn’t work) today. We’ll touch on some of the legal, policy, and business aspects of bitcoin and discuss some potential research opportunities in cryptocurrencies.
A New Age of JVM Garbage Collectors (Clojure Conj 2019)Alexander Yakushev
Some programmers might think that garbage collection is a solved problem. It runs with the VM and takes care of your unused objects – what else would you want? However, the recent spike of interest in new garbage collectors for JVM (Shenandoah, ZGC) and beyond (Go GC) shows that there are still possibilities for improvement. In this talk, we will briefly walk through the history of memory management and discover what the modern GCs can do for you.
This module explains several additional important concepts. These include properties of QObjects, data types, QString and various list types.
Special classes in Qt provide even more convenient APIs if you want to save settings in the right way for the target platform.
At the end, a guide walks you through what you need to know about embedding files and resources into your application.
Are you building high throughput, low latency application? Are you trying to figure out perfect JVM heap size? Are you struggling to choose right garbage collection algorithm and settings? Are you striving to achieve pause less GC? Do you know the right tools & best practices to tame the GC? Do you know to troubleshoot memory problems using GC logs? You will get complete answers to several such questions in this presentation.
Blockchain Satellites - The Future of Space CommerceHasshi Sudler
Presentation made on 10/26/2020 outlining the launch of the first private blockchain into space on the Firefly Aerospace rocket planned for late December, 2020. This presentation is delivered by Hasshi Sudler and Alejandro Gomez of Villanova University and Elizabeth Kennick and Joe Latrell of Teachers In Space.
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
Tucson Blockchain Devs meetup June 7 and O'Reilly Fluent 2018. Some things to consider if you're starting to think about how to integrate with blockchains.
This presentation is about world's hot trending topic known as "Cryptocurrency". This presentation covers a general knowledge about cryptocurrency, crypto coins, bitcoin, coin mining. It specifically shows people about how to start mining and what are the basic requirements.
WSO2Con USA 2017: Keynote - The Blockchain’s Digital DisruptionWSO2
Almost a decade ago, little-known open-source cryptocurrency called Bitcoin made its debut with little fanfare. Its underlying technological innovation has now caught the world’s attention; developers, startups, corporations, academic institutions, and governments are all examining what blockchain technology can solve. Currency, assets, identity, trade settlement, cross-border payments, privacy and regulation are areas being explored. This session will explore the past, present, and future of blockchain technology and how it may influence your business.
An technical overview of Ethereum that provides a full picture starting from the original problem of building a distributed ledger and mining up to smart contracts.
Please note that there are no llamas in this presentation.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
This PPT shows the ways of how cryptomining happens and the mitigations for this type of attacks along with the some of the features of block chain which can help us build new age technologies.
Ever wondered how a blockchain works. What about bitcoin?
It's very interesting that a lot of engineering tricks have been used there that you don't find in system at large. Let's dig in...
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
Concise version of presentation delivered at the NYC Bar Association.
Overview of blockchains, how cryptography works on blockchains and the difference between cryptocurrencies and tokens.
The speaker share his vision on the prospects of employing the technology for practical tasks. He presented basics of the blockchain architecture with case studies of JavaScript blockchain implementation using Node.js.
This presentation by Valerii Radchenko (Senior Software Engineer, Consultant, GlobalLogic, Kharkiv) was delivered at GlobalLogic Kharkiv JS TechTalk #2 on August 17, 2018.
Keynote: Blockchain Technology: a Sustainable Concept for the Future?Ingo Weber
The keynote at the Kryptorechtstag Wien titled "Blockchain Technology: a Sustainable Concept for the Future?" started with a brief introduction to blockchain technology. The talk aimed to critically evaluate the future prospects of blockchain in terms of environmental sustainability and electricity usage. It included an up-to-date view on these topics, using Bitcoin and Ethereum as primary examples.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Why Digital Currency?
●
Cash for the Internet
–
–
Privacy
–
●
Security
Crypto-anarchy
Examples
–
Digicash – one of the very first cryptocurrencies
–
PayPal
–
eGold
–
Liberty Reserve
3. How they work
●
●
●
●
Digicash used Chaumian blind signatures and
a mint to check for double spends
PayPal and Liberty Reserve balance/d user
deposits against deposits with partner
institutions
eGold kept bullion in a vault and balanced
user deposits against that
Centralized ledgers – single point of failure
4. Decentralization
●
A public ledger so everyone plays by the rules
–
●
Each full peer verifies all transactions
Timestamps to prevent double-spending
–
–
●
Miners operate distributed timestamp server
Proof of work = lottery
Initial distribution
–
Mining rewards
–
“Scamcoins” often “pre-mine” - SolidCoin
5. The Nitty Gritty - Transactions
●
Each transaction is a set of ledger entries
●
Two lists
–
–
●
●
Outputs consist of amount and condition to redeem that
money - debit
Inputs consist of pointer to previous output and script that
makes the condition return true - credit
Total input amount >= total output amount, the
remainder is miner fees
All outputs are fully used up when used as inputs,
change outputs to new “address” help preserve privacy
6. Transaction Diagram
By Matthäus Wander (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/bysa/3.0)], via Wikimedia Commons
http://commons.wikimedia.org/wiki/File%3ABitcoin_Transaction_Inputs_and_Outputs.png
7. Blocks
●
●
●
●
Each block contains header and list of Txes
Header contains hash of last header, timestamp,
target, root of TX Merkle tree, nonce, and TX count is
replaced with padding
Arranged in a TREE of possible TX orderings
Hash of the block being less than the target is proof of
work – like HashCash, but reusable
●
First TX is the “coinbase” - trustless inflation
●
Until a TX is in a block, no work secures it
8. Blockchain
●
●
The blockchain is a ledger, blocks are pages
Longest branch of block tree by cumulative
proof of work is blockchain
●
Represents current network consensus state
●
Parameters change to keep time, limit supply
–
difficulty retargeting every 2016 blocks
–
subsidy halves every 210,000 blocks
9. Blockchain Diagram
By Matthäus Wander (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/bysa/3.0)], via Wikimedia Commons
http://commons.wikimedia.org/wiki/File%3ABitcoin_Block_Data.svg
10. P2P Network
●
Message-based protocol
●
Provides for
–
Peer discovery
–
Broadcast of transactions and blocks
–
Download of blockchain by new nodes
–
Download of memory pool by newly started nodes
–
Stateful (Bloom filter) connections for “lite” nodes
–
Alert broadcasts
11. Transaction Example
●
Alice has received two outputs – 5 mBTC and
10 mBTC, wants to pay Bob 12 mBTC
●
Bob generates “address,” gives it to Alice
●
Alice generates “change address,” creates TX:
–
Input 1: 5 mBTC
–
Input 2: 10 mBTC
–
Output 1: 12 mBTC to Bob's address
–
Output 2: 2.9 mBTC to her change address
12. Transaction Example, Continued
●
Alice broadcasts TX to peer nodes
●
Peers verify TX, add to mempool, rebroadcast
●
Eventually, transaction makes it to Bob's node
●
Miners include TX in block they're working on,
recalculate Merkle root and keep hashing
●
When a block is found, miner broadcasts
●
Peers validate and rebroadcast
●
Alice and Bob see their first confirmation!
13. Result
●
Decentralized payment network – more like
settlement network
●
Unconfirmed TXes = “cleared,” confirmed = “settled”
●
All TXes are in bitcoins
●
Limited supply – Thiers' Law
●
Open platform for commerce and innovation
●
No middlemen, no borders, no censorship, no SPOF,
only the rules of its own design
14. The Future Is Here
●
●
●
Criteria for redemption can specify complex
contracts using scripts
Scripts can check signatures, hashes, m-of-n
signatures, and transactions can enforce
nLockTime and limited selection of
input/output combinations
Applications include deposits, assurance
contracts, escrow, micropayments, bets
15. Caveats
●
Privacy is user-defined
●
Scalability
–
–
UTXO indexing/blockchain pruning, SPV
–
Off-chain transactions, centralized and not
–
●
Block size – CPU, network, storage
Off-chain bets and other complex contracts
Transaction malleability
–
Important to contracts with refund failsafes
–
Cause of the latest ruckus
16. Alt-coins
●
●
Many use same technology but alter
parameters like hash algorithm, block
frequency, monetary policy – Litecoin, Freicoin,
Dogecoin
Some use unique concepts – proof of stake,
additional scripting and data storage
capabilities – PPCoin, NXT, Ethereum,
Mastercoin
19. Alt-coin mining
●
●
Bitcoin mining software and ASICs can often
be adapted for SHA256-based coins
Litecoin and other scrypt-based coins are still
using GPUs, though ASICs are rumored
–
–
●
cgminer for AMD GPUs
cudaMiner for Nvidia GPUs
P2Pool supports Litecoin as well (maybe not
any more?)
20. Getting and Using Bitcoins
●
●
●
●
Buy from Coinbase, LocalBitcoins, or exchange –
caveat emptor
Sell goods or services for Bitcoin – Coinbase and
BitPay make it easy, or use FOSS
Trade for altcoins at Cryptsy and other
exchanges
Buy from many Coinbase and BitPay enabled
merchants like Overstock.com, Gyft.com,
fiverr.com, and adafruit.com
21. Desktop Bitcoin Wallets
●
Multibit – simple, SPV wallet
●
Electrum – uses a blockchain server
●
Hive – SPV wallet for Mac OS X
●
Bitcoin-QT and bitcoind – the full node
●
Armory – advanced security features, requires
bitcoind
22. Android and Web Bitcoin Wallets
●
Bitcoin Wallet by Andreas Schildbach – SPV
●
Mycelium – Android, uses a blockchain server
●
Blockchain.info – web-based and Android app
●
Coinbase – web-based and Android app
●
CoinKite – web wallet and debit card/terminal